Overview
Explore host-based intrusion detection techniques using Windows 2000 auditing features in this comprehensive Black Hat conference talk. Delve into the intricacies of leveraging W2K's built-in auditing capabilities to enhance system security and detect potential threats. Learn how to effectively configure and utilize these powerful tools to monitor and protect your Windows 2000 environment from unauthorized access and malicious activities. Gain valuable insights from security expert Macy Bergoon as she shares practical strategies and best practices for implementing robust host-based intrusion detection systems using native Windows 2000 functionalities.
Syllabus
Black Hat Windows 2001 - Host Based Intrusion Detection Using W2K Auditing Features
Taught by
Black Hat